Cisco Cisco Web Security Appliance S390 Mode D'Emploi
6-7
AsyncOS 9.2 for Cisco Web Security Appliances User Guide
Chapter 6 Classify End-Users and Client Software
Identification Profiles and Authentication
Identification Profiles and Authentication
The following diagram shows how the Web Proxy evaluates a client request against an Identification
Profile when the Identification Profiles is configured to use:
Profile when the Identification Profiles is configured to use:
•
No authentication surrogates
•
IP addresses as authentication surrogates
•
Cookies as authentication surrogates with transparent requests
•
Cookies as authentication surrogates with explicit requests and credential encryption is enabled
Figure 6-1
Identification Profiles and Authentication Processing – No Surrogates and
IP-based Surrogates
IP-based Surrogates